It's a custom obfuscation so no way to figure out it easily without reverse engineering.But it's possible to (ab)use a bug in the obfuscation and a particular feature of the format for guessing the 128 bytes used for encrypting the data, in fact this sort of key changes for every entry so it's necessary to calculate the new one every time... you have been very lucky this time.Download the script version 0.1.21 http://aluigi.org/bms/warinc.bms

Script 0.1.21a, it's an important fix so redownload the script and run it again.Now ALL the files are correctly extracted except 32 files (directx shaders cache) that are skipped... 32 on 30900 is not bad at all

Anyway I have updated the script for ignoring the error with type 99 just in case the file provided by you and the other user are not related, that would explain why the offset is different http://aluigi.org/bms/warinc.bms

You cannot post new topics in this forumYou cannot reply to topics in this forumYou cannot edit your posts in this forumYou cannot delete your posts in this forumYou cannot post attachments in this forum